Quiz 4 Flashcards

1
Q

Securing a traditional scene is accomplished by (choose all that apply)

A

stringing crime tape.

posting guards.

asking people to leave.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Books and manuals can give investigators clues as to the skill level of the target but not what kind of technology they may be up against. True or False?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cellphones are vulnerable because (choose all that apply)

A

they may be wiped by the cell provider.

the battery may drain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The correct order of volatility (from most volatile to least volatile)

A

registers, memory, archival media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Under certain legal requirements, your notes could become discoverable and made available to the opposing side. This can happen if you take your notes with you to the witness stand. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A bit for bit copy of a hard drive is known as a (choose all that apply)

A

forensic clone.

bit stream image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Copying and pasting gets the active data - that is, data that are accessible to the user as well as deleted files. True or False?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exigent circumstances may provide rationale for conducting your examination on the original digital evidence. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The suspect’s drive is known as the destination drive and the drive the investigator is cloning to is called the source drive because it is the source of the analysis. True or False?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

“The process of identifying, preserving, collecting, preparing, reviewing, and producing ESI in the context of the legal process” is the definition of

A

discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

​What does FRE stand for?

A

​Federal Rules of Evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should you do while copying data on a suspect’s computer that is still live?​

A

​Make notes regarding everything you do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To investigate employees suspected of improper use of company digital assets, a company policy statement about misuse of digital assets allows corporate investigators to conduct covert surveillance with little or no cause, and access company computer systems and digital devices without a warrant.​ True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If practical, _______ team(s) should collect and catalog digital evidence at a crime scene or lab.

A

one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_______ does not recover data in free or slack space.

A

​Sparse acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which system below can be used to quickly and accurately match fingerprints in a database?​

A

​Automated Fingerprint Identification System (AFIS)

17
Q

_______ is the term for a statement that is made by someone other than an actual witness to the event while testifying at a hearing.

A

Hearsay

18
Q

​As a general rule, what should be done by forensics experts when a suspect computer is seized in a powered-on state?

A

​The decision should be left to the Digital Evidence First Responder (DEFR).

19
Q

Which court case established that it is not necessary for computer programmers to testify in order to authenticate computer-generated records?​

A

​United States v. Salgado

20
Q

In cases that involve dangerous settings, what kind of team should be used to recover evidence from the scene?​

A

HAZMAT